CONTENT SECURITY BEST PRACTICES COMMON GUIDELINES - MPAA Content Security Program - Motion ...
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
MPAA Content Security Program CONTENT SECURITY BEST PRACTICES COMMON GUIDELINES https://www.mpaa.org/best-practices Version 4.05 May 31, 2019
MPAA Global Content Security Program May 31, 2019 D OCUMENT H ISTORY Version Date Description Author 1.0 December 31, 2009 Initial Public Release Deloitte & Touche LLP, MPAA, MPAA Member Companies 2.0 May 15, 2011 Updates and Revisions Consolidation into Common Guidelines and PwC LLP, MPAA, MPAA Member Companies Supplementals 2.1 January 1, 2013 Updates and Revisions PwC LLP, MPAA, MPAA Member Companies 3.0 April 2, 2015 Updates and Revisions MPAA, MPAA Member Companies 4.02 December 1, 2017 Updates and Revisions MPAA, MPAA Member Companies 4.03 July 18, 2018 Updates and Revisions MPAA, MPAA Member Companies 4.04 October 12, 2018 Updates and Revisions MPAA Content Security, MPAA IT, MPAA Member Companies 4.05 May 31, 2019 Updates and Revisions MPAA Content Security, MPAA Member Companies MPAA Best Practices - Common Guidelines Page i
MPAA Global Content Security Program May 31, 2019 TABLE OF CONTENTS Document History ......................................................................................................................................................................................................... i I. Best Practices Overview .................................................................................................................................................................................... 2 II. Facility Overview ................................................................................................................................................................................................ 3 III. Risk Management and Document Organization ................................................................................................................................................ 4 IV. Best Practices Format ........................................................................................................................................................................................ 6 V. Best Practice Common Guidelines .................................................................................................................................................................... 7 Appendix A — Glossary............................................................................................................................................................................................. 77 Appendix B — MPAA Title and Distribution Channel Definitions .............................................................................................................................. 81 Appendix C — Mapping of Controls to References ................................................................................................................................................... 83 Appendix D — Suggested Policies and Procedures ................................................................................................................................................. 88 Appendix E — Other Resources and References ..................................................................................................................................................... 89 MPAA Best Practices - Common Guidelines Page 1
MPAA Global Content Security Program May 31, 2019 I. B EST P RACTICES O VERVIEW Providing a standard assessment vehicle for further individual Introduction discussions regarding content security between Members and their business partners. For more than three decades, the Motion Picture Association of America, Inc. (MPAA) has managed content security assessments on behalf of its Member Companies (Members): Paramount Purpose and Applicability Pictures Corporation; Sony Pictures Entertainment Inc.; Universal City Studios LLC; Netflix; Walt Disney Studios Motion Pictures and The purpose of this document is to provide current and future third- Warner Bros. Entertainment Inc. party vendors engaged by Members with an understanding of general content security expectations and current industry best Starting in 2007, these reviews were performed using a practices. Decisions regarding the use of vendors by any particular standardized survey model, process and report template. Since Member are made by each Member solely on a unilateral basis. then, almost 500 facilities have been surveyed in 32 countries. Content security best practices are designed to take into During the middle of 2018, the MPAA started performing consideration the services the facility provides, the type of content assessments through the TPN (Trusted Partner Network). The the facility handles, and in what release window the facility MPAA is also involved in the governance and operations of the operates. TPN program. Best practices outlined in this document are subject to local, state, The MPAA is committed to protecting the rights of those who create regional, federal and country laws or regulations. entertainment content for audiences around the world. From creative arts to the software industry, more and more people Best practices outlined in this document, as well as the industry around the globe make their living based on the power of their standards or ISO references contained herein, are subject to ideas. This means there is a growing stake in protecting intellectual change periodically. property rights and recognizing that these safeguards are a Compliance with best practices is strictly voluntary. This is cornerstone of a healthy global information economy. not an accreditation program. The MPAA Content Security Program’s purpose is to strengthen Exception Process the process by which its Member content is protected during production, post-production, marketing and distribution. This is Where it may not be feasible to meet a best practice, facilities accomplished by the following: should document why they cannot meet the best practice and Publishing a set of best practices by facility service outlining implement compensating measures used in place of the best standard controls that help to secure Member content; practice. Exceptions should also be communicated directly to the Member. Assessing and evaluating content security at third-party partners based on published best practices; Questions or Comments Reinforcing the importance of securing Member content; and If you have any questions or comments about the best practices, please email: contentsecurity@mpaa.org MPAA Best Practices - Common Guidelines Page 2
MPAA Global Content Security Program May 31, 2019 II. F ACILITY O VERVIEW The following table describes the typical services offered, content handled and release window involved with each facility type. Typical Facility Typical Facility No. Facility Type Type of Content Release Window No. Facility Type Type of Content Release Window Services Services 1 Audio, Original and Foreign Low-Resolution Pre-Theatrical 8 In Flight IFE Lab High-Resolution – Full or Pre-Theatrical Dubbing and Language Dubbing Watermarked/Spoiled Pre-Home Video Entertainment IFE Integration Partial Content Pre-Home Video (IFE) and Spoiled – Full or Partial Sub-Titling Subtitling Full/Partial Feature Hotel Catalog Hospitality Content SFX Content Airline Services Scoring Audio Masters Cruise Ship/Ferry ADR/Foley Libraries Hospitals 2 Courier, Courier Services Varied Pre-Theatrical Prisons Delivery and Delivery Services Pre-Home Video Catalog 9 Post- Telecine High-Resolution – Full or Pre-Theatrical Freight Shipping Companies Production Duplication Partial Content Pre-Home Video 3 Creative Non-Finishing Watermarked, Spoiled Pre-Theatrical Services Editing Catalog Advertising Trailer Full/Partial Feature Pre-Home Video Finishing Content Catalog TV Spots QC Stills Teasers Replication Pre-Mastering High Resolution Pre-Home Video Clips 10 Graphics Mastering Clean Image Web Ads Replication 4 Digital Digital Cinema High-Resolution – Full or Pre-Theatrical Check Disc Creation Mastering Partial Content Visual Digital Post-Production High-Resolution – Partial Pre-Theatrical Cinema 11 Replication Digital Cinema Effects Computer Generated Frames, Shots, Sequences Post-Theatrical Distribution Masters Key Management (VFX) Imagery and Stills (2D to 3D) Digital Cinema Packages Animation Scripts 5 Digital Digital Intermediate Clean and High Pre-Theatrical Storyboards Scanning Resolution – Full or Catalog Services 12 Application Application Varied Varied Partial Content (Film Film Recording Tape) Development Film Restoration 6 Distribution Distribution High Resolution Pre-Theatrical Clean Image Pre-Home Video 13 Cloud Hosting Varied Varied Fulfillment Catalog Data Center Backroom/Film Depot DVD/Tape Recycling 7 DVD Compression Clean – Full Feature Pre-Home Video Creation Authoring Encoding Regionalization Special Features Check DiscQC MPAA Best Practices - Common Guidelines Page 3
MPAA Global Content Security Program May 31, 2019 III. R ISK M ANAGEMENT AND D OCUMENT ORGANIZATION Risk Assessment In consultation with the Member (its client), an organization is Risks should be identified through a risk assessment, and responsible for determining which client assets require a higher appropriate controls should be implemented to decrease risk to an level of security. The following table provides an example of how to acceptable level and ensure that business objectives are met. classify content: The International Organization for Standardization (ISO) 27000 defines risk as the "combination of the probability of an event and Classification Description Examples its consequence." For example, what is the probability that content can be stolen from a facility’s network and released publicly and High-Security Any content that the Theft of a blockbuster what is the business consequence to an organization and the client Content organization believes feature before its first if this occurs (e.g., contractual breach and/or loss of revenue for would result in worldwide theatrical that release window). financial loss, negative release brand reputation, or Theft of home video The importance of a robust management system is also highlighted serious penalties content before its first in the ISO 27001 standard that shows how to establish an should the asset be worldwide street date Information Security Management System (ISMS). stolen or leaked Theft of masters or Asset Classification screeners Additional information about risks generally associated with each One way to classify assets at your facility is to follow a four-step facility type is also included in each supplemental best practice. process, which is summarized below: Security Controls Identify and The IT Governance Institute defines controls as “the policies, Classify Assets procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be Monitor and Determine achieved and undesired events will be prevented or detected and Evaluate Minimum Security Effectiveness Control Set corrected.” Security controls are typically selected based on the classification of the asset, its value to the organization, and the risk of the asset being leaked or stolen. Implement Controls In order to mitigate identified risks, organizations are encouraged to implement controls commensurate to each specific risk. Such measures should also be evaluated periodically for their design and effectiveness based on the current threat environment. MPAA Best Practices - Common Guidelines Page 4
MPAA Global Content Security Program May 31, 2019 MPAA Best Practices – Common Guidelines Page 5
MPAA Global Content Security Program May 31, 2019 IV. B EST P RACTICES F ORMAT Best practices are presented for each security topic listed in the MPAA Content Security Model using the following format: MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER The chart at the top of every page highlights the security area being addressed within the overall MPAA Content Security Model. No. Security Topic Best Practice Implementation Guidance PS-8.0 Keys Limit the distribution of master keys to authorized Maintain a list of company personnel who are allowed to personnel only (e.g., owner, facilities management) check out master keys Update the list regularly to remove any company personnel who no longer require access to master keys PS-8.1 Implement a check-in/check-out process to track and Maintain records to track the following information: monitor the distribution of master keys Company personnel in possession of each master key Time of check-out/check-in Reason for check-out P No. Security Topic Best Practice Implementation Guidance Glossary Each best practice is Each capability area is Best practices are Additional considerations, potential All terms that are assigned a reference comprised of one of more outlined for each implementation steps and included in the number in the form of XX- “Security Topics.” Each Security Topic. examples are provided to help glossary are Y.Z. XX for the general Security Topic is addressed organizations implement the best highlighted in bold area, Y for the Security with one or more best practices. and defined in Topic, and Z for the practices. Appendix A. specific control. MPAA Best Practices - Common Guidelines Page 6
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER V. B EST P RACTICE C OMMON G UIDELINES No. Security Topic Best Practice Implementation Guidance MS-1.0 Executive Security Establish an information security management system Reference established information and content security Awareness/ that implements a control framework for information frameworks e.g. MPAA Best Practices, ISO27001’s, NIST Oversight security which is approved by the business owner(s) / 800-53, SANS, CoBIT, etc. senior management. Establish an independent team for information security. Persons responsible for information security should not be working on content. MS-1.1 Executive Security Review content / information security management Consider adjustments to policies and procedures from the Awareness/ policies and processes at least annually. Policies must be following changes: Oversight approved by senior management. Organization’s business, services offered, etc. Technology infrastructure Client requirements Regulations or laws Risk landscape MS-1.2 Executive Security Train and engage executive management/owner(s) on the Trainings and attendees should be documented in training Awareness/ business' responsibilities to protect content at least logs Oversight annually. MS-1.3 Executive Security Create an information security management group to Members of the information security management group Awareness/ establish and review information security management should also attend security awareness training (see MS- Oversight policies. 1.2) MS-2.0 Risk Management Develop a formal, documented security risk assessment Define a clear scope for the security risk assessment and process focused on content workflows and sensitive modify as necessary assets in order to identify and prioritize risks of content Incorporate a systematic approach that uses likelihood of theft and leakage that are relevant to the facility. risk occurrence, impact to business objectives/content protection and asset classification for assigning priority Refer to MS-8.0 for best practices regarding documented workflows MPAA Best Practices - Common Guidelines Page 7
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-2.1 Risk Management Conduct an internal security risk assessment annually and Conduct meetings with management and key stakeholders upon key workflow changes—based on, at a minimum, at least quarterly to identify and document content theft the MPAA Best Practice Common Guidelines and the and leakage risks applicable Supplemental Guidelines—and document and Conduct external and internal network vulnerability scans act upon identified risks. and external penetration testing, per DS-1.8 and DS-1.9 Identify key risks that reflect where the facility believes content losses may occur Implement and document controls to mitigate or reduce identified risks or where risks are being accepted with rationale (e.g. budget constraints, resource constraints etc.) Monitor and assess the effectiveness of remediation efforts and implemented controls at least quarterly Document and budget for security initiatives, upgrades, and maintenance Indicate rationale for initiative/project prioritization (risk- based, cost-based, schedule based, etc.) MS-3.0 Security Identify security key point(s) of contact and formally define Prepare organization charts and job descriptions to Organization roles and responsibilities for content and asset protection. facilitate the designation of roles and responsibilities as it pertains to content security Provide online or live training to prepare security personnel on policies and procedures that are relevant to their job function MPAA Best Practices - Common Guidelines Page 8
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-4.0 Policies and Establish policies and procedures regarding asset and Consider facility/business-specific workflows in Procedures content security; policies should address the following development of policies and procedures. topics, at a minimum: Require executive management to sign off on all policies and procedures before they are published and released Acceptable use (e.g., social media, Internet, phone, Communicate disciplinary measures in new hire orientation personal devices, mobile devices, etc.) training Asset and content classification and handling policies Please see Appendix D for a list of policies and procedures Business continuity (backup, retention and restoration) to consider Content transfer processes and systems Change control and configuration management policy Confidentiality policy Digital recording devices (e.g., smart phones, digital cameras, camcorders) Exception policy (e.g., process to document policy deviations) Incident response policy Mobile device policy Network, internet and wireless policies Password controls (e.g., password minimum length, screensavers) Security policy Visitor policy Disciplinary/Sanction policy Internal anonymous method to report piracy or mishandling of content (e.g., telephone hotline or email address) MPAA Best Practices - Common Guidelines Page 9
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-4.0.1 Policies and Establish dedicated policies governing the use of social Social media policies should state that the following not be Procedures media by company personnel. shared on any social media platform (e.g. Facebook, Twitter, IMDB, YouTube), forum, blog post, or website: Personal experiences, opinions and information related to pre-release content and related project activities References to clients without the express written consent from the client Posting, referencing or sharing of pre-release security or working titles Use separate dedicated email accounts for marketing purposes when accessing social media platforms (e.g. Facebook, Twitter, IMDB, YouTube), forum, blog post, or website. MS-4.0.2 Policies and Establish policies governing the using of mobile Address the following in mobile computing device policies: Procedures computing devices. o BYOD if allowed: define the rights of the company and the rights of the owner, allowable devices / models o Acceptable use: corporate and personal o Restrictions on areas of the facility where mobile computing devices with recording capabilities are not allowed o Procedures for lost or stolen devices o Security measures (see Section DS-10) MS-4.1 Policies and Review and update security policies and procedures at Log/track versions & revisions Procedures least annually. Incorporate the following factors into the annual managerial review of security policies and procedures: Recent security trends Feedback from company personnel New threats and vulnerabilities Recommendations from regulatory agencies (i.e., FTC, etc.) Previous security incidents MPAA Best Practices - Common Guidelines Page 10
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-4.2 Policies and Communicate and require sign-off from all company Provide the company handbook containing all general Procedures personnel (e.g., employees, temporary workers, interns) policies and procedures upon hire of new company and third party workers (e.g., contractors, freelancers, personnel and third party workers temp agencies) for all current policies, procedures, and/or Notify company personnel and third party workers of client requirements. updates to security policies, procedures and client requirements Management must retain sign-off of current policies, procedures, and client requirements for all company personnel and third party workers MS-4.3 Policies and Develop and regularly update an awareness program Communicate security awareness messages during Procedures about security policies and procedures and train management/staff meetings company personnel and third party workers upon hire Implement procedures to track which company personnel and annually thereafter on those security policies and have completed their annual security training (e.g., procedures, addressing the following areas at a minimum: database repository, attendee logs, certificates of completion) IT security policies and procedures Provide online or in-person training upon hire to educate Content/asset security and handling in general and company personnel and third party workers about client-specific requirements common incidents, corresponding risks, and their Social media policies responsibilities for reporting detected incidents Social engineering prevention Distribute security awareness materials such as posters, Security incident reporting and escalation emails, and periodic newsletters to encourage security Disciplinary policy awareness Encryption and key management for all individuals who Develop tailored messages and training based on job handle encrypted content responsibilities and interaction with sensitive content (e.g., Asset disposal and destruction processes IT personnel, production) to mitigate piracy issues Conduct social engineering education, training, and testing (see NIST SP 800-115 and SANS Methods for Understanding and Reducing Social Engineering Attacks) Consider recording training sessions and making recordings available for reference MPAA Best Practices - Common Guidelines Page 11
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-5.0 Incident Response Establish a formal incident response plan that describes Consider including the following sections in the incident actions to be taken when a security incident is detected response plan: and reported. Definition of incident Notification of security team Escalation to management Analysis of impact and priority Containment of impact Eradication and recovery Key contact information, including client studio contact information Notification of affected business partners and clients Notification of law enforcement Report of details of incident Reference NIST SP800-61 Revision 2 on Computer Security Incident Handling MS-5.1 Incident Response Identify the security incident response team who will be Include representatives from different business functions in responsible for detecting, analyzing, and remediating order to address security incidents of all types; consider security incidents. the following: Management Physical security Information security Network team Human resources Legal Provide training so that members of the incident response team understand their roles and responsibilities in handling incidents MPAA Best Practices - Common Guidelines Page 12
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-5.2 Incident Response Establish a security incident reporting process for Consider implementing a group email address for reporting individuals to report detected incidents to the security incidents that would inform all members of the incident incident response team. response team Communicate and document incidents promptly to clients whose content may have been leaked, stolen or otherwise compromised (e.g., missing client assets), and conduct a post-mortem meeting with management and client. Implement a security breach notification process, including the use of breach notification forms Involve the Legal team to determine the correct actions to take for reporting content loss to affected clients Discuss lessons learned from the incident and identify improvements to the incident response plan and process Perform root cause analysis to identify security vulnerabilities that allowed the incident to occur Identify and implement remediating controls to prevent similar incidents from reoccurring Communicate the results of the post-mortem, including the corrective action plan, to affected clients MS-5.2.1 Incident Response Anonymous reporting should be made available to organizations with 50 or more employees and third party personnel for reporting of content protection and piracy concerns. The anonymous reporting tool consisting of an internal, anonymous telephone number, email address, and / or website should be published and also provided during security awareness training. MS-5.3 Incident Response (Removed and combined with MS-5.2) MPAA Best Practices - Common Guidelines Page 13
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-6.0 Business Establish a formal plan that describes actions to be taken Consider including the following sections in the business Continuity & to ensure business continuity. continuity plan: Disaster Recovery Threats to critical assets and content, including loss of power and telecommunications, systems failure, natural disasters etc. Detailed information system, content and metadata backup procedures and information system documentation, including configuration of critical WAN and LAN / Internal Network devices Encryption of backups (AES-256) Backup power supply to support at least 15 minutes for the CCTV system, alarm and critical information systems, including software to perform a safe shutdown of critical systems Consider use of an off-site backup location Notification of security team Escalation to management Analysis of impact and priority Containment of impact Priorities for recovery and detailed recovery procedures, including manual workarounds and configuration details of restored systems Key contact information Notification of affected business partners and clients Testing of business continuity and disaster recovery processes at least annually MS-6.1 Business Identify the business continuity team who will be Include defined roles and responsibilities Continuity & responsible for detecting, analyzing and remediating Provide training so that members of the business Disaster Recovery continuity incidents. continuity team understand their roles and responsibilities MPAA Best Practices - Common Guidelines Page 14
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-6.2 Business Establish a data backup policy that addresses the Align backup policy with the business continuity plan Continuity & following: Implement physical and environmental security controls Disaster Recovery (per MPAA guidelines) for offsite storage to prevent Systems and data unauthorized access or stolen / lost content Retention and protection requirements Encrypt backups using AES with at least 256 bit key before Backup frequency storing content offsite in remote locations or on the cloud Encryption Notify clients if the cloud backups will be used Recovery time objectives (RTO) Frequency of backups and recovery testing must be based Recovery point objectives (RPO) on RTO and RPO that meets client requirements. The Restoration testing following is recommended: Secure offsite storage Daily incremental and weekly backups RTO of 48 hours or less for client content Quarterly data restoration testing Review process should be in place to ensure that only authorized administrators are able to access backup location MPAA Best Practices - Common Guidelines Page 15
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-7.0 Change Control & Establish policies and procedures to ensure new data, Include documentation that describes installation, Configuration applications, network, and systems components have configuration and use of devices, services and features, Management been pre-approved by business leadership. and update documentation as needed Document known issues and procedures for dealing with them Include procedures for reporting bugs and security vulnerabilities Restrict and monitor the installation of hardware or software Manage risks associated with changes to data, applications, network infrastructure and systems o Review security controls and integrity procedures to ensure they will not be compromised by changes o Ensure that appropriate backup or roll-back procedures are documented and tested o Identify all affected computer software, data files, database entities, and infrastructure o Minimize business disruption when implementing change Document and retain all change requests, testing results and management approvals MS-8.0 Workflow Document workflows tracking content and authorization Use swim lane diagrams to document workflows checkpoints. Include the following processes for both Include asset processing and handling information where physical and digital content: applicable Evaluate each touch-point for risks to content Delivery (receipt/return) Implement controls around authorization checkpoints Ingest Identify related application controls Movement Update the workflow when there are changes to the Storage process, and review the workflow process at least Removal/destruction annually to identify changes. Follow the content workflow and implemented controls for each process in order to determine areas of vulnerability MS-8.1 Workflow (Removed and combined with MS-8.0) MPAA Best Practices - Common Guidelines Page 16
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-9.0 Segregation of Segregate duties within the content workflow. Implement Document roles and responsibilities to eliminate an overlap Duties and document compensating controls where segregation of role-based job functions such as: is not practical. Vault and server/machine room personnel Shipping and receiving personnel Asset movement within facility (e.g., runners) from vault and content / production area Digital asset folder access (e.g., data wrangler sets up access for producer) Content transfer personnel from production personnel Segregate duties using manual controls (e.g., approval from producer before working on content) or automated controls in the work ordering system (e.g., automated approval for each stage of the workflow) Implement compensating controls when segregation is unattainable, such as: Monitor the activity of company personnel and/or third party workers Retain and review audit logs Implement physical segregation Enforce management supervision MS-10.0 Background Perform background screening checks on all company Carry out background checks in accordance with relevant Checks personnel, third party workers, and their relevant laws, regulations, union bylaws, and cultural subcontractors. considerations Screen potential company personnel and third party workers using background screening checks that are proportional to the business requirements, the sensitivity of content that will be accessed, and possible risks of content theft or leakage Perform identity, academic, and professional qualification checks where necessary Where background checks are not allowed by law, document as an exception and use reference checks MPAA Best Practices - Common Guidelines Page 17
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-11.0 Confidentiality Require all company personnel to sign a confidentiality Include non-disclosure guidance pertaining to Agreements agreement (e.g., non-disclosure) upon hire and annually confidentiality after termination of their employment, thereafter, that includes requirements for handling and contract, or agreement protecting content. Explain the importance of confidentiality / NDA in non-legal terms, as necessary Ensure all relevant information on equipment used by company personnel to handle business-related sensitive content is transferred to the organization and securely removed from the equipment Management must retain signed confidentiality agreements for all company personnel MS-11.1 Confidentiality Require all company personnel to return all content and Utilize an off boarding process for terminated employees to Agreements client information in their possession upon termination of ensure the following: their employment or contract. o all content and client information is returned o company equipment and property is returned o keys, access cards, badges are returned o reasons for termination are documented o user accounts / access rights on all systems are removed or disabled MS-12.0 Third Party Use Require all third party workers (e.g., freelancers) who Include non-disclosure guidance in policies pertaining to and Screening handle content to sign confidentiality agreements (e.g., confidentiality during and after their employment, contract, non-disclosure) upon engagement. or agreement Explain the importance of confidentiality / NDA in non-legal terms, as necessary Ensure all relevant information on equipment used by third party workers to handle business-related sensitive content is transferred to the organization and securely removed from the equipment Management must retain signed confidentiality agreements for all third party workers Include requirements for handling and protecting content MS-12.1 Third Party Use Require all third party workers to return all content and and Screening client information in their possession upon termination of their contract. MPAA Best Practices - Common Guidelines Page 18
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-12.2 Third Party Use Include security requirements in third party contracts. Service Level Agreements (SLAs) and contracts with the and Screening third party vendors should the following provisions: Require third party workers to comply with the security requirements per MPAA Best Practices A right to audit clause for activities that involve sensitive content Notification to clients upon suspected or actual security breaches Content ownership, return, and destruction Termination clause Implement a process to monitor for compliance with security requirements Require annual update of information when contracts are renewed MS-12.3 Third Party Use Implement a process to reclaim content when terminating Ensure all content on third party equipment is transferred and Screening relationships with third party service providers. to the organization and securely erased from the equipment MS-12.4 Third Party Use Require third party workers to be bonded and insured Require third party workers to show proof of insurance and Screening where appropriate (e.g., courier service). and keep a record of their insurance provider and policy number Require annual update of information when contracts are renewed MS-12.5 Third Party Use Restrict third party access to content / production areas Ensure that third party workers who do not handle and Screening unless required for their job function. content (e.g., cleaning crews, HVAC maintenance, etc.) are not given any access to areas housing or exhibiting content Escort third party workers who do not handle content when access to restricted areas (e.g., vault) is required MPAA Best Practices - Common Guidelines Page 19
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS- Third Party Use Control access of third party IT service providers to the Third-party VPN remote access should only be used in 12.5.1 and Screening computing environment. cases where no other solution is available. Client approval is required in writing. All third-party VPN remote access should have a finite end date and be reviewed for activity every three months at a minimum Third-party VPN remote access should not provide access to network infrastructure that includes networks or systems used to store, transfer, or manipulate content All third-party access sessions should be monitored by an employee and logged Log and monitor IT service providers access to systems, networks, and infrastructure Third-party systems used for remote access should be subjected to an inspection, by an employee, on a periodic and ongoing basis IT service provider remote access must utilize multi-factor authentication Disable IT service provider remote access when not needed Change remote access passwords for every session Follow change control processes for elevating user access rights Consider real-time notification when IT service providers access systems MPAA Best Practices - Common Guidelines Page 20
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance MS-12.6 Third Party Use Notify clients if third parties are used to handle or store Work offloaded to another company must be reported to and Screening content, or work is offloaded to another company. Perform the content owners and requires written client sign-off / due diligence of third parties. approval Production servers and systems hosted on third-party Third parties also include providers of IT services. Obtain networks must be vetted by content owners prior to client approval for use of third parties who handle, store, deployment. or have access to content. Cloud-Hosted systems and servers are strictly prohibited without advanced written consent of content owners. Workflows using cloud hosted servers should be approved by content owners. Perform due diligence and ongoing monitoring of third parties to verify the following: o Security controls meet MPAA Best Practices o Adequate level of insurance coverage (refer to MS- 12.4) o Viable financial state Request that third parties obtain an independent security assessment for submission to the member studios MPAA Best Practices - Common Guidelines Page 21
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance PS-1.0 Entry/Exit Points Secure all entry/exit points of the facility at all times, Permit entry / exit points to be unlocked during business including loading dock doors and windows. hours if the reception area is segregated from the rest of the facility with access-controlled doors PS-1.1 Entry/Exit Points Control access to areas where content is handled by Allow access to content / production areas on a need-to- segregating the content area from other facility areas know basis (e.g., administrative offices, waiting rooms, loading docks, Require rooms used for screening purposes to be access- courier pickup and drop-off areas, replication and controlled (e.g., projection booths) mastering). Limit access into rooms where media players are present (e.g., Blu-ray, DVD) Enforce a segregation of duties model which restricts any single person from having access to both the replication and mastering rooms PS-1.2 Entry/Exit Points Control access where there are collocated businesses in a facility, which includes but is not limited to the following: Segregating work areas Implementing access-controlled entrances and exits that can be segmented per business unit Logging and monitoring of all entrances and exits within facility All tenants within the facility must be reported to client prior to engagement PS-2.0 Visitor Entry/Exit Maintain a detailed visitors’ log and include the following: Verify the identity of all visitors by requiring them to present valid photo identification (e.g., driver's license or Name government-issued ID) Company Consider concealing the names of previous visitors Time in/time out The facility should retain visitor logs for twelve months at a Reason for visit minimum. Person/people visited Signature of visitor Badge number assigned MPAA Best Practices - Common Guidelines Page 22
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance PS-2.1 Visitor Entry/Exit Assign an identification badge or sticker which must be Make visitor badges easily distinguishable from company visible at all times, to each visitor and collect badges upon personnel badges (e.g., color coded plastic badges) exit. Consider a daily rotation for paper badges or sticker color Consider using badges that change color upon expiration Log badge assignments upon entry/exit Visitor badges should be sequentially numbered and tracked Account for badges daily Facilities that have less than 25 employees are not required to have visitor badges PS-2.2 Visitor Entry/Exit Do not provide visitors with key card access to content / production areas. PS-2.3 Visitor Entry/Exit Require visitors to be escorted by authorized employees while on-site, or in content / production areas. PS.2.3.1 Visitor Entry/Exit Visitors should be required to sign a nondisclosure agreement (NDA) and sign a visitor log prior to entering a facility. PS-3.0 Identification Provide company personnel and long-term third party Issue photo identification badge to all company workers (e.g., janitorial) with a photo identification personnel and long-term third party workers after a badge that is required to be visible at all times. background check has been completed Establish and implement a process for immediately retrieving photo identification badge upon termination Consider omitting location, company name, logo and other specific information on the photo identification badge Consider using the photo identification badge as the access key card where possible Require employees to immediately report lost or stolen photo identification badges Provide a 24/7 telephone number or website to report lost or stolen photo identification badges Train and encourage employees to challenge persons without visible identification MPAA Best Practices - Common Guidelines Page 23
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance PS-4.0 Perimeter Security Implement perimeter security controls that address risks Implement security controls based upon the location and that the facility may be exposed to as identified by the layout of the facility, such as: organization's risk assessment. Restricting perimeter access through the use of walls, fences, and/or gates that, at a minimum, are secured after hours; walls/fences should be 8 feet or higher Securing and enclosing, as necessary, common external areas such as smoking areas and open balconies Installing lighting with full coverage outside the facility to decrease risk of theft or security violations Sufficient external camera coverage around common exterior areas (e.g., smoking areas), as well as parking Being cognizant of the overuse of company signage that could create targeting Glass break sensors as necessary Using alarms around the perimeter, as necessary PS-4.1 Perimeter Security Place security guards at perimeter entrances and non- Note: Not all sites require security guards. This should be emergency entry/exit points. determined based on risk, per MS-2.1 PS-4.2 Perimeter Security Implement a daily security patrol process with a Consider the following if applicable: randomized schedule and document the patrol results in a Require security guards to patrol both interior and log. exterior areas Include a review of emergency exits, including verification of seals Use a guard tour patrol system to track patrolling (e.g., checkpoint) and verify locks PS-4.3 Perimeter Security Lock perimeter gates at all times. Consider the following if applicable: Implement an electronic arm, that is manned by security personnel, to control vehicle access into the facility Distribute parking permits to company personnel and third party workers who have completed proper paperwork Require visitor vehicles to present identification and ensure that all visitors have been pre-authorized to enter the premises MPAA Best Practices - Common Guidelines Page 24
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance PS-5.0 Alarms Install a centralized, audible alarm system that covers all Place alarms at every entrance to alert security personnel entry/exit points (including emergency exits), windows, upon unauthorized entry to the facility loading docks, fire escapes, and restricted areas (e.g., Enable the alarm when facility is unsupervised vault, server/machine room, etc.). PS-5.1 Alarms Install and effectively position motion detectors in Ensure the alarm system covers storage areas and vaults restricted areas (e.g., vault, server/machine room) and (e.g., through motion sensors) after normal business configure them to alert the appropriate security and other hours, as an added layer of security personnel (e.g. project managers, producer, head of editorial, incident response team, etc.). PS-5.2 Alarms Install door prop alarms in restricted areas (e.g. vault, Configure access-controlled doors to trigger alarms and server, machine rooms) to notify when sensitive entry/exit alert security personnel when doors have been propped points are open for longer than a pre-determined period of open for an extended period of time time (e.g., 60 seconds). PS-5.3 Alarms Configure alarms to provide escalation notifications Establish and implement escalation procedures to be directly to the personnel in charge of security and other followed if a timely response is not received from security personnel (e.g., project managers, producer, head of personnel upon notification editorial, incident response team, etc.). Consider implementing automatic law enforcement notification upon breach Implement procedures for notification on weekends and after business hours PS-5.4 Alarms Assign unique arm and disarm codes to each person that Use unique alarm codes to track individuals responsible for requires access to the alarm system and restrict access to arming or disarming the alarm all other personnel. Update assigned alarm codes at an interval approved by management in order to reduce risk involved with sharing and losing codes Issue alarm codes to personnel on a least privilege basis Security personnel, contractors, vendors, cleaning crews, and freelance staff should not have administrator rights to the alarm system Alarm notifications should be sent to appropriate company personnel according to an escalation tree. MPAA Best Practices - Common Guidelines Page 25
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance PS-5.5 Alarms Review the list of users who can arm and disarm alarm Remove users who have left the company or have systems quarterly, or upon change of personnel. changed job roles Deactivate the alarm codes that were assigned to removed users PS-5.6 Alarms Test the alarm system quarterly. Simulate a breach in physical security and ensure the following: Alarm system detects the breach Security personnel are alerted Security personnel respond in a timely manner according to procedures PS-5.7 Alarms Implement fire safety measures so that in the event of a power outage, fire doors fail open, and all others fail shut to prevent unauthorized access. PS-6.0 Authorization Document and implement a process to manage facility Designate an individual to authorize facility access access and keep records of any changes to access Notify appropriate personnel (e.g., facilities management) rights. of changes in employee status Create a physical or electronic form that must be filled out by a supervisor to request facility access for company personnel and/or third party workers Assign responsibility for investigating and approving access requests PS-6.1 Authorization Restrict access to production systems to authorized personnel only. PS-6.2 Authorization Review access to restricted areas (e.g., vault, Validate the status of company personnel and third party server/machine room) quarterly and when the roles or workers employment status of company personnel and/or third Remove access rights from any terminated users party workers are changed. Verify that access remains appropriate for the users’ associated job function MPAA Best Practices - Common Guidelines Page 26
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance PS-7.0 Electronic Access Implement electronic access throughout the facility to Assign electronic access to specific facility areas based on Control cover all entry/exit points and all areas where content is job function and responsibilities stored, transmitted, or processed. Update electronic access accordingly when roles change or upon termination of company personnel and third party workers Keep a log that maps electronic access device number to company personnel See Logging and Monitoring PS-10.0 Review the times when electronic access is not required for common areas (e.g., public elevators) PS-7.1 Electronic Access Restrict electronic access system administration to Restrict electronic system administration to designated Control appropriate personnel. personnel and do not allow individuals who have access to production content to perform administrative electronic access tasks Assign an independent team to administer and manage electronic access PS-7.2 Electronic Access Store card stock and electronic access devices (e.g., Limit access to the locked cabinet to the keycard / Control keycards, key fobs) in a locked cabinet and ensure electronic access device system administration team electronic access devices remain disabled prior to being Require sign-out for inventory removal assigned to personnel. Store unassigned electronic access devices (e.g., keycards, key fobs) in a locked cabinet and ensure these remain disabled prior to being assigned to personnel. PS-7.3 Electronic Access Disable lost electronic access devices (e.g., keycards, Educate company personnel and third party workers to Control key fobs) in the system before issuing a new electronic report lost electronic access devices immediately to access device. prevent unauthorized access into the facility Require identification before issuing replacement electronic access devices PS-7.4 Electronic Access Issue third party access electronic access devices with Ensure that third party electronic access devices are Control a set expiration date (e.g. 90 days) based on an approved easily distinguishable from company personnel electronic timeframe. access devices Ensure that expiration date is easily identifiable on the electronic access devices Assign third party electronic access devices on a need-to- know basis MPAA Best Practices - Common Guidelines Page 27
MPAA Global Content Security Program May 31, 2019 MANAGEMENT SYSTEM PHYSICAL SECURITY DIGITAL SECURITY ASSET CONTENT CONTENT ORGANIZATION AND MANAGEMENT FACILITY TRANSPORT INFRASTRUCTURE MANAGEMENT MANAGEMENT TRANSFER No. Security Topic Best Practice Implementation Guidance PS-8.0 Keys Limit the distribution of master keys and / or keys to Maintain a list of company personnel who are allowed to restricted areas to authorized personnel only (e.g., owner, check out master keys facilities management). Update the list regularly to remove any company personnel who no longer require access to master keys PS-8.1 Keys Implement a check-in/check-out process to track and Maintain records to track the following information: monitor the distribution of master keys and / or keys to Company personnel in possession of each master key restricted areas. Time of check-out/check-in Reason for check-out Require master keys to be returned within a set time period and investigate the location of keys that have not been returned on time PS-8.2 Keys Use keys that can only be copied by a specific locksmith Use high-security keys (cylinders) that offer a greater for exterior entry/exit points. degree of resistance to any two or more of the following: Picking Impressioning Key duplication Drilling Other forms of forcible entry PS-8.3 Keys Inventory master keys and keys to restricted areas, Identify, investigate, and address any missing keys including facility entry/exit points, quarterly. (lost/stolen) Review logs to determine who last checked out a key that cannot be accounted for Change the locks when missing master keys or keys to restricted areas cannot be accounted for PS-8.4 Keys Obtain all keys from terminated employees/third-parties or those who no longer need the access. PS-8.5 Keys Implement electronic access control or rekey entire facility when master or sub-master keys are lost or missing. MPAA Best Practices - Common Guidelines Page 28
You can also read